A recent vulnerability scan found four vulnerabilities on an organization’s public Internet-facing IP addresses.
Prioritizing in order to reduce the risk of a breach to the organization, which of the following should be remediated FIRST?
A . A cipher that is known to be cryptographically weak.
B . A website using a self-signed SSL certificate.
C . A buffer overflow that allows remote code execution.
D . An HTTP response that reveals an internal IP address.